Sciweavers

11603 search results - page 125 / 2321
» Embedded System Security
Sort
View
ACISP
2003
Springer
15 years 8 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
112
Voted
CRITIS
2008
15 years 6 months ago
Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture
Pierluigi Assogna, Glauco Bertocchi, Antonio DiCar...
ACSAC
2010
IEEE
15 years 2 months ago
Hardware assistance for trustworthy systems through 3-D integration
Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood,...
CCS
2008
ACM
15 years 6 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
IEEESP
2011
14 years 8 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...